Fundamentals of Cybersecurity Flashcards
What is Information Security?
Protecting data and information from unauthorized access, modification, disruption, disclosure, and destruction.
What is Information Systems Security?
Protecting the systems (e.g computers , servers, network devices) that hold and process critical data.
CIANA What does it stand for
Confidentiality, integrity, availability, Non- Repudiation, and Authentication
Which out of the five CIANA
Refers to the protection of information from unauthorized access and disclosure
Ensure that private or sensitive information is not available or disclosed to unauthorized individuals, entities, or processes.
Confidentiality
WhIch out of the five CIANA refers to ensuring information and data remain accurate and unchanged from original state unless intentionally modified by an authorized individual
Integrity
Why is integrity important
Ensure data accuracy , Maintain Trust, and ensure system operability
What are the five ways that cybersecurity professionals keep integrity?
- Hashing - Process of converting data into a fixed size value. Hash Digest - Digital fingerprint
- Digital Signatures - Use encryption to ensure integrity and authenticity.
- Checksums- Method to verify the integrity of data during transmission. (Checksum checks if data has been corruption.
- Access controls - Ensure that only authorized individuals can modify data and reduce the risk of unintentional of malicious alterations.
- Regular Audits - Involve reviewing logs and operations to ensure that only authorized changes have been made and any discrepancies are addressed.
Which of the CIANA emphases the important of having servers up and running
Availability
Why is availability important? Ensuring Business continuity, Maintaining customer trust. Organizing reputation.
Ensuring Business continuity, Maintaining customer trust. Organizing reputation
How do we keep availability?
REDUNDANCY- Duplication of critical components or functions of a system within the organization
There is four redundancy types what are they?
THE FOUR REDUNDANCY
Server redundancy - Involves using multiple servers in a load balance so that if one is overloaded or fails the other servers can take over the load.
Data Redundancy- Involves storing data in multiple places.
Network redundancy- Ensures that if one network paths fails the data can travel through route
Power - Different power sources
Which out of the CIANA refers to he idea that someone cannot deny the validity of their actions, such as signing a document or sending a message?
Non Repudiation
How do we keep non repudiation
Digital signature - Created by first hashing a particular message or communication to be digitally signed and encrypting the hash digest with the user’s private key using asymmetric encryption.
Important for three main reasons - Using digital signature
Confirming the Authenticity of Digital Transactions
Ensuring integrity
Providing accessibility
What are the Triple AAA’s
Authentication, Authorization, Accounting
What are the five methods of keeping authentication?
Five methods - Knowledge factor - Relies on information that a user can recall like username or password
Possession factor - Physical item to authenticate yourself. Example like OTP
Inherence factor - Providing a unique physical or behavioral characteristic - like face
Action factor - Relies on a user to conduct a specific action
Location Factor - Relies on the user being a specific location